TY - JOUR
T1 - Cryptanalysis and improvement of "a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks"
AU - Alizadeh, Mojtaba
AU - Zamani, Mazdak
AU - Baharun, Sabariah
AU - Manaf, Azizah Abdul
AU - Sakurai, Kouichi
AU - Anada, Hiroki
AU - Keshavarz, Hassan
AU - Chaudhry, Shehzad Ashraf
AU - Khan, Muhammad Khurram
N1 - Funding Information:
This work was supported by Malaysia- Japan International Institute of Technology (MJIIT) center at Universiti Teknologi Malaysia, Japan Student Services Organization (JASSO), and Sakurai Lab, Graduate School and Faculty of Information Science and Electrical Engineering, Kyushu University, Fukuoka Japan. Muhammad Khurram Khan extends his sincere appreciations to the Deanship of Scientific Research at King Saud University for its funding for the Prolific Research Group (PRG-1436-16). Authors acknowledge support from Malaysia-Japan International Institute of Technology (MJIIT) center at Universiti Teknologi Malaysia, Japan Student Services Organization (JASSO), and Kyushu University, Fukuoka Japan. Authors acknowledge the support from Malaysia-Japan International Institute of Technology (MJIIT) center at Universiti Teknologi Malaysia, Japan Student Services Organization (JASSO), and Kyushu University, Fukuoka, Japan. The authors extend their sincere appreciations to the Deanship of Scientific Research at King Saud University for its funding this Prolific Research Group (PRG-1436-16).
Publisher Copyright:
© 2015 Alizadeh et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
PY - 2015/11/1
Y1 - 2015/11/1
N2 - Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.
AB - Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.
UR - http://www.scopus.com/inward/record.url?scp=84956941011&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84956941011&partnerID=8YFLogxK
U2 - 10.1371/journal.pone.0142716
DO - 10.1371/journal.pone.0142716
M3 - Article
C2 - 26580963
AN - SCOPUS:84956941011
SN - 1932-6203
VL - 10
JO - PLoS One
JF - PLoS One
IS - 11
M1 - 0142716
ER -